These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

332 related articles for article (PubMed ID: 32070468)

  • 1. Cyber security threats in the microbial genomics era: implications for public health.
    Fayans I; Motro Y; Rokach L; Oren Y; Moran-Gilad J
    Euro Surveill; 2020 Feb; 25(6):. PubMed ID: 32070468
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review.
    Nifakos S; Chandramouli K; Nikolaou CK; Papachristou P; Koch S; Panaousis E; Bonacina S
    Sensors (Basel); 2021 Jul; 21(15):. PubMed ID: 34372354
    [No Abstract]   [Full Text] [Related]  

  • 3. Cyber-attacks and threats for healthcare - a multi-layer thread analysis.
    Spanakis EG; Bonomi S; Sfakianakis S; Santucci G; Lenti S; Sorella M; Tanasache FD; Palleschi A; Ciccotelli C; Sakkalis V; Magalini S
    Annu Int Conf IEEE Eng Med Biol Soc; 2020 Jul; 2020():5705-5708. PubMed ID: 33019270
    [TBL] [Abstract][Full Text] [Related]  

  • 4. How is cyber threat evolving and what do organisations need to consider?
    Borrett M; Carter R; Wespi A
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):163-71. PubMed ID: 24457327
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Analysis of security and privacy challenges for DNA-genomics applications and databases.
    Arshad S; Arshad J; Khan MM; Parkinson S
    J Biomed Inform; 2021 Jul; 119():103815. PubMed ID: 34022422
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Cyber-attacks in the next-generation cars, mitigation techniques, anticipated readiness and future directions.
    Khan SK; Shiwakoti N; Stasinopoulos P; Chen Y
    Accid Anal Prev; 2020 Dec; 148():105837. PubMed ID: 33120180
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Cyber Attacks on Healthcare Devices Using Unmanned Aerial Vehicles.
    Sethuraman SC; Vijayakumar V; Walczak S
    J Med Syst; 2019 Dec; 44(1):29. PubMed ID: 31838588
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Cybersecurity Challenges in Healthcare.
    Sendelj R; Ognjanovic I
    Stud Health Technol Inform; 2022 Oct; 300():190-202. PubMed ID: 36300412
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A Cyber-Security Risk Assessment Methodology for Medical Imaging Devices: the Radiologists' Perspective.
    Mahler T; Shalom E; Makori A; Elovici Y; Shahar Y
    J Digit Imaging; 2022 Jun; 35(3):666-677. PubMed ID: 35178644
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Automated Cyber and Privacy Risk Management Toolkit.
    Gonzalez-Granadillo G; Menesidou SA; Papamartzivanos D; Romeu R; Navarro-Llobet D; Okoh C; Nifakos S; Xenakis C; Panaousis E
    Sensors (Basel); 2021 Aug; 21(16):. PubMed ID: 34450935
    [TBL] [Abstract][Full Text] [Related]  

  • 11. The cyber security threat stops in the boardroom.
    Scully T
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):138-48. PubMed ID: 24457325
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).
    Sheikh ZA; Singh Y; Singh PK; Gonçalves PJS
    Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420626
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Analyzing Cyber-Physical Threats on Robotic Platforms.
    Ahmad Yousef KM; AlMajali A; Ghalyon SA; Dweik W; Mohd BJ
    Sensors (Basel); 2018 May; 18(5):. PubMed ID: 29883403
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.
    Ferdinand J
    J Bus Contin Emer Plan; 2015-2016 Winter; 9(2):185-95. PubMed ID: 26642176
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Defining Cyber Security and Cyber Security Risk within a Multidisciplinary Context using Expert Elicitation.
    Cains MG; Flora L; Taber D; King Z; Henshel DS
    Risk Anal; 2022 Aug; 42(8):1643-1669. PubMed ID: 33586204
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.
    Mallinder J; Drabwell P
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):103-11. PubMed ID: 24457322
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.
    Dunn Cavelty M
    Sci Eng Ethics; 2014 Sep; 20(3):701-15. PubMed ID: 24781874
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Cyber crime: can a standard risk analysis help in the challenges facing business continuity managers?
    Vande Putte D; Verhelst M
    J Bus Contin Emer Plan; 2013-2014 Winter; 7(2):126-37. PubMed ID: 24457324
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Cybersecurity in healthcare: A systematic review of modern threats and trends.
    Kruse CS; Frederick B; Jacobson T; Monticone DK
    Technol Health Care; 2017; 25(1):1-10. PubMed ID: 27689562
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Denial-of-Service Attack on IEC 61850-Based Substation Automation System: A Crucial Cyber Threat towards Smart Substation Pathways.
    Ashraf S; Shawon MH; Khalid HM; Muyeen SM
    Sensors (Basel); 2021 Sep; 21(19):. PubMed ID: 34640735
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 17.